TechCentralTechCentral
    Facebook Twitter YouTube LinkedIn
    Facebook Twitter LinkedIn YouTube
    TechCentral TechCentral
    NEWSLETTER
    • News

      Where to next for Dimension Data

      5 July 2022

      Zapper is said to seek fundraising at huge valuation

      5 July 2022

      Stage-5 load shedding to continue until Thursday

      5 July 2022

      Big step forward for Cell C as debt deal approved

      5 July 2022

      Eskom unions accept 7% wage offer

      5 July 2022
    • World

      Bitcoin hints at a bottom – but it may be different this time

      5 July 2022

      China, US war of words erupts over lunar missions

      5 July 2022

      Tether fails to calm jittery nerves

      4 July 2022

      EU to impose wide-ranging new rules on the crypto industry

      3 July 2022

      Crypto hedge fund Three Arrows files for bankruptcy

      3 July 2022
    • In-depth

      The bonfire of the NFTs

      5 July 2022

      The NFT party is over

      30 June 2022

      The great crypto crash: the fallout, and what happens next

      22 June 2022

      Goodbye, Internet Explorer – you really won’t be missed

      19 June 2022

      Oracle’s database dominance threatened by rise of cloud-first rivals

      13 June 2022
    • Podcasts

      How your organisation can triage its information security risk

      22 June 2022

      Everything PC S01E06 – ‘Apple Silicon’

      15 June 2022

      The youth might just save us

      15 June 2022

      Everything PC S01E05 – ‘Nvidia: The Green Goblin’

      8 June 2022

      Everything PC S01E04 – ‘The story of Intel – part 2’

      1 June 2022
    • Opinion

      South Africa can no longer rely on Eskom alone

      4 July 2022

      Has South Africa’s advertising industry lost its way?

      21 June 2022

      Rob Lith: What Icasa’s spectrum auction means for SA companies

      13 June 2022

      A proposed solution to crypto’s stablecoin problem

      19 May 2022

      From spectrum to roads, why fixing SA’s problems is an uphill battle

      19 April 2022
    • Company Hubs
      • 1-grid
      • Altron Document Solutions
      • Amplitude
      • Atvance Intellect
      • Axiz
      • BOATech
      • CallMiner
      • Digital Generation
      • E4
      • ESET
      • Euphoria Telecom
      • IBM
      • Kyocera Document Solutions
      • Microsoft
      • Nutanix
      • One Trust
      • Pinnacle
      • Skybox Security
      • SkyWire
      • Tarsus on Demand
      • Videri Digital
      • Zendesk
    • Sections
      • Banking
      • Broadcasting and Media
      • Cloud computing
      • Consumer electronics
      • Cryptocurrencies
      • Education and skills
      • Energy
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Motoring and transport
      • Public sector
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Advertise
    TechCentralTechCentral
    Home»Top»Curious case of the banned Russian hacker

    Curious case of the banned Russian hacker

    Top By David Glance16 January 2017
    Facebook Twitter LinkedIn WhatsApp Telegram Email
    Alisa Shevchenko

    As one of his parting acts as US president, Barack Obama retaliated against alleged Russian interference in the recent American election by expelling 35 Russian government officials from the US and placing sanctions on Russian security agencies, three companies and several individuals.

    One of the companies included on the sanctions list was Zorsecurity (also known as Esage Lab), which was set up by a Russian programmer Alisa Shevchenko. According to the White House, Zorsecurity was included because it had provided the GRU (one of Russia’s military intelligence services) “with technical research and development”.

    And that was it. Except that Shevchenko has vehemently denied that she has worked for the Russian government, stating: “We don’t make malware for the Russian government.”

    The difficulty for Shevchenko is that she simply doesn’t know what being placed on a sanctions list means for her personally. To be clear, there was no trial, no evidence presented publicly, nor was there an opportunity to provide a defence, there was simply an accusation and a listing on a public announcement.

    What makes this particularly frustrating for Shevchenko is that the company listed doesn’t trade anymore and so from one perspective the entire matter is moot.

    It seems extraordinary that a high stakes response to the Russian government and Russian President Vladimir Putin should have on one hand two of Russia’s secret service agencies, the FSB and GRU, and on the other hand a defunct company run at one time by a solitary Russian hacker with a handful of employees.

    It has been argued that the evidence put forward to tie the Russian intelligence services with the hack of the Democratic National Committee (DNC) was not definitive enough to prove the link. Evidence for Russian involvement comes essentially from comparing the malware and techniques used by the hackers to previous hacks believed to be by specific groups, in this case from two groups called APT 28 (aka Fancy Bear) and APT 29 (aka Cozy Bear). These groups in turn are thought to be associated with the GRU (APT 28) and FSB (APT 29).

    While the debate continues over whether the evidence presented is sufficient to definitively tie specific groups to the hack, none of the evidence presented ties in with Shevchenko and Zorsecurity.

    Shevchenko’s situation highlights the perils of being associated with cybersecurity even if you are one of the good guys, the so-called “white hat” hackers. She is a self-taught and talented programmer who specialises in finding “zero-day” exploits.

    While these exploits can, and are, used by criminals and spies, they can also be used to probe weaknesses in corporate networks as part of what is called penetration testing. In fact, Shevchenko has publicly contributed to finding and reporting vulnerabilities in energy management software and Microsoft Windows.

    It is possible that some of her software or exploits were used by the GRU and FSB (and others) in gaining access to the DNC and other targets. However, that is a different matter to her, or the company, actively working with these agencies. Given the large number of companies and people who could potentially be involved with hacking on behalf the Russian services, it seems gratuitous that the US would single out a solitary female hacker to shoulder the entire blame.

    Outgoing US President Barack Obama

    The irony here is that in his rush to publicly be seen to respond to Russian hacking, Obama has sought to punish a female programmer working in cybersecurity. A key tenant of his presidency was to try and boost the participation of women in the tech industry with his own secret service agency the NSA employing hackers in their ongoing struggle to recruit real talent.

    Not only is Shevchenko in a minority of women working in this area of programming, but she has been extremely active in engaging in conferences and the open-source community to develop and contribute software, knowledge and expertise. Alisa Shevchenko was also one of the founders of a community “hack space” Neuron Hackspace. None of this particularly suggested an ideologue dedicated to the hacking of the DNC.

    Inadvertently perhaps, Obama has sent a clear message of the dangers for cybersecurity experts in becoming collateral damage in the political battles between the US, Russia and China. Just possibly, he has also just reinforced the extra dangers for women who stand out from the crowd?

    In an additional irony, it may be that incoming US President Donald Trump will come to Shevchenko’s aid. He has indicated that he may reverse Obama’s sanctions against the Russians, especially if the Russians collaborate with the US against terrorism.The Conversation

    • David Glance is director of the UWA Centre for Software Practice, University of Western Australia
    • This article was originally published on The Conversation
    Alisa Shevchenko Barack Obama David Glance Donald Trump Esage Lab Vladimir Putin Zorsecurity
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email
    Previous ArticleSwitch is a big gamble for Nintendo
    Next Article Let’s open up AI: Satya Nadella

    Related Posts

    Bitcoin hints at a bottom – but it may be different this time

    5 July 2022

    China, US war of words erupts over lunar missions

    5 July 2022

    Tether fails to calm jittery nerves

    4 July 2022
    Add A Comment

    Comments are closed.

    Promoted

    Hot Ink certifies and diversifies to maintain competitive printing edge

    5 July 2022

    Increased flexibility with Dell Precision Mobile Workstations

    5 July 2022

    The 5 secrets of customer experience in the cloud era

    5 July 2022
    Opinion

    South Africa can no longer rely on Eskom alone

    4 July 2022

    Has South Africa’s advertising industry lost its way?

    21 June 2022

    Rob Lith: What Icasa’s spectrum auction means for SA companies

    13 June 2022

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2022 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.